Jump to content
xisto Community

iGuest

Members
  • Content Count

    72,093
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by iGuest

  1. This technology has failed badly: http://forums.xisto.com/no_longer_exists/
  2. Google funds a lot of projects. Ben Goodger who grew up in Auckland, NZ was the lead developer for Firefox, he use to work on Netscape before this which Netscape actually gave Firefox some of the features they had today, especially extensions/add-ons. Google hired him some years back to help with Chrome I believe, but he still is sometimes helping Firefox as well.Google is trying to use their name as a means of targetting consumers, but goodwill can only do so much. I would believe Android is doing beter than Chrome OS and I'm actually waiting till google stop working on both and just merge it into one. I'm sure this is bound to happen eventually.Cheers,MC
  3. On this page, not a single *BLEEP*ing mention of Accept? What is wrong with you all?
  4. You can try with seagate file recovery mac tool to get back your crucial data. It is an excellent tool that had recovered all my data. If you are interested then text out your reply, will provide you the link.
  5. xkill really is only for windows, well I haven't looked into it more than this becaue it required mouse action. Another command is kill, but you need to know pid of the program running and also background processes really are meant to run in the background and not be known to users that they are running behind the scense. Usually if I know what I want to kill, I would do kill `pidof name_of_program` or I would use top or ps with grep to grab specifically only what I need. ps is like a snapshot of the running processes, while top is real time (well close enough to real time) System Monitor is probably your best tool because it's similar to Task Manager and that's what you're use to. top could be the same as well but really requires you to set it up so it's not too confusing. It has a lot of statistical information at the top, like how long your computer has been up (uptime), number of users on the system, memory and stuff. All these stats can be turned off by pressing l (lowercase L), t, m. If you're looking for a program that is using a lot of CPU power or memory, then these stats are not worth looking at. What you would be more concerned about is the PID, USER, %CPU, %MEM and COMMAND, you can press f and customise what fields you want to see as well as understand what each column means I usually only show these fields and sort by CPU which you press s while on the CPU field. You can press page up and page down to see what else is running, but usually CPU usuage can be quite little. So I rarely need to kill a program. As I mentioned, top has a lot of keys to achieve the filters you would want. Like if you only want to see tasks by your user press u then type the user you want to see. Press L to search for something like a program or PID, maybe you can search for top then take the PID number top has and press k type that PID number in and kill it with signal 15 and you've killed top. It's quite a powerful tool but I don't actually now anyone who really uses these tools as you don't usually have problems unless you're a developer who can create memory leaks or hog the CPU. For more commands press h inside top and it'll hopefully suggest other things you can do, but I gave the basics. Cheers, MC
  6. There are many tutorial online here http://whatismyipadd.com/hide-ip.`I have used free proxy before but there are several disadvantages to using proxies for the activities, the main disadvantages would include lack of security, unreliable connections, and the fact that they only change the IP of your browser, not applications or software. Right now I am using hidemyass.com. It is very reliable and I feel safe while browsing the net.
  7. Well setting permissions up, depends on security preferences.Also I thought the format was your-computer\your-user-or-group but you can skip the your-computer part and put just your username in.Either way, I would put your user down, programs that are writing to it should be under your user control, so use your user credentials. You would only allow groups if you want people in that group to have the same ability as you as well on that partitions. Just have a look at how other drives letters are set, you'll just want to do something similar to those that you can write to.Cheers,MC
  8. Since this partition (windows uses drive letters right?) use to belong to another installation, it's actually also owned by that previous installation.What you need to do is take ownership of it. I believe you right click on that drive letter, select Properties and then select the Security tab, then hit the Advance button. From there you select the Owner tab then hit the Edit button. Select your user (yourself) to be the owner and their should be a checkbox to Replace owner, check that and then Apply/OK.Now you should be able to write to it as you're the owner for it.Cheers,MC
  9. I have used laptop-mode-tools in ubuntu before, but this was mainly because it use to be installed by default but not enabled. I'm not sure if they install it now. I also recall another power management tool called Jupiter that was quite popular at the time, again not sure if it's needed anymore because some of the fixes/improvements that went into pm-utils, was to cover some of the top power saving features of these tool. I think the only difference laptop-mode-tools does now is hard drive power down/idling, whether it's still required I am not sure. Ubuntu has a page on power saving techniques, I think these tools are just convenience to perform those specified tasks. Linux only titles can only get fame in the Linux community. Everything you install should have documentation hopefully. Usually this is where you would start with troubleshooting and fixing configuration files. Because you have laptop-mode-tools running, it could be the fact that from changing from on power to off power, the laptop_mode setting is causing the problem. Not sure why it use to be included with Ubuntu even if you didn't use a laptop but it use to always default to not being enabled too. I didn't really like having things included that served no purpose rather than convenience so most of the time I would spend clearing things I don't use. Turning off services I didn't use. A command line equivalent for task manager would be top but you should either look at the man pages on it, man top so you can learn some of the basic commands. Also when running top, you can press h to get help as well, but it's not that easy to understand. If you just want to kill a program, you can use xkill which lets you pick with the mouse what window you need to kill. It turns the cursor into a cross and clicking on the window will kill that program. Some usually set this up as a shortcut so that you can click on it then click on the window to kill easier. Cheers, MC
  10. Why would you call proprietary software nasty? Linux-libre wasn't the first to strip the non-free bits out, this all started with Utoto-e.I recall running linux-libre, when I trialled BLAG out (debian users may want to look at gNewSense), although I haven't kept up to date with this GNU OS in a while and probably should consider trialling it again. As I do feel that freedom is better than convenience.The problem you can encounter, with removal of some of the non-free items is that a lot of things wouldn't work out of the box so I am not sure if it has improved. Even being compelled to find alternatives, usually alternatives do not exist and unless you're good with driver development, it could also be a while till it does. This will tarnish the user experience and would put everything backwards. I think we still need to balance everything until we reach the time where we aren't reliant on these proprietary software. This means that a lot of companies really need to work with everyone so that we can reach this ideal place.Cheers,MC
  11. What I meant is that you only need to share the devices you want to share, e.g. just a keyboard and mouse. There's no need to share a monitor if each machine will use a separate monitor. The network USB device is expensive, the cheaper alternative would be a PS/2 switch but that also means having PS/2 devices, but in total it should still be less than the network USB, however, that's to share over a network, it could be possible to having a switch just between USB devices, in which eliminating the network aspect, there might be a slightly cheaper device.The way you want it to happen though still requires the ability of switching the devices. Any remote connection, is usually a single computer sharing the same resources including monitor, so unless you have a dual monitor setup, it's not going to work how you want.At the stage, the way you change devices is so far the cost effective way. Getting another keyboard and mouse for the system maybe the next cheapest way. Getting something that can switch the devices between can be another cheap option if you can find the right device. There are so much mass production of these items from india, china, etc, that they go for quite cheap.You could also try to create the device yourself, which means 2 USB cables you can cut, a manual switch and a USB hub minimum of 2 ports, but it doesn't sound like it'd be any cheaper.Cheers,MC
  12. This looks very handy but it's hidden away in a dialog, also how did it get the name Live HTTP Header? Do those headers displayed in that dialog update automatically, does it only show 1 request at a time? I prefer Firebug using the network analyzer, which is live/real time of requests when it's active and it is shown in it's own pane which by default is at the bottom of your browser, although you can shift it to any side. Firebug has a lot of features that help with web development but also has quite a steep learning curve too (if you want to learn all the features). There are other addons that can be integrated with Firebug to provide any more useful resources too. Cheers, MC
  13. I do agree with switching to MariaDB over MySQL but I don't think Oracle will kill the DB, just probably use it to help their own company out in some way.They have acquired a lot of content management companies, logistics and transportation, financials, social networks, etc I'm just waiting till they put out something that makes heads turn. Although, probably targetted at enterprises, so it's going to come with a hefty price tag.So from your steps, does these services start automatically?That's definitely targetted for easier use which is great. Although, knowing how to turn on and off a system would be good for the user too which is why making it too easy means they don't learn necessary steps.Cheers,MC
  14. I used Linux as a keyword for search results, even if it was used incorrectly but it's more widely used than GNU. I hope your starting paragraph was also to help increase your search ranking too. What Richard Stallman really wanted was people to call it GNU OS, but then he wouldn't give credit to Linus for his work on Linux. He first thought calling it Lignux which didn't go too well and then GNU/Linux. He then later said Linux and the GNU System as Linux comes before GNU in the loading process. Either way, what is he trying to do? Make up for his mistakes in not forking Linux and creating a complete system called GNU OS? Or is it that his ideals on freedom and showing how working together can make it better? If he had forked it, he would have shot himself in the foot. It's now possible to fork Linux and GNU and call the OS whatever you like and all they get is credit in source but who wants to take on that when others are happy to help Linux continue it's success. It's not hard to replace GNU to work with Linux, so would that mean I still need to call it GNU/Linux? Either way I'm not sure what is trying to be implied here, is their any of these implications associated with the license? I don't think so. You also mentioned Debian based GNU/Linux. So what has Debian done that people have based their OS on it? Usually it's just how sources are packaged with the tools that Debian created to make deb packages and how they structured their files because they aren't usually basing it on their policy which is why these forks usually take place. That's why I didn't say Red Hat based but RPM-based because although they get their roots from it. What is exactly their product and what is that of the free software they use. If we are going to name everything, then it might be Linux/GNU/RPM/GNOME... and whatever other ridiculous things we may have to add in between etc before we get the complete idea of what it should really be named. Cheers, MC
  15. Why would you say "I haven't used a program in a long time and it's a terrible program." I use Corel because I work in the awards industry. The vector aspect is wonderful for running a laser or CNC table. The integrated photo capabilities are great for use with sublimation and direct print printers. I haven't used Photoshop, so therefore "I HAVE NO OPINION ON IT." Seriously, if you don't use a program how can you justifiably make a comment on how well it works?
  16. It's not really a ground pin, but could be connected to ground to make it easier for it to link from 5 to 10 in one go. Basically it's a no connection pin meaning not wired and more commonly a reserve, but I guess you could join it to ground as it's serving no purpose. Since VGA is old technology, it will probably not have any changes to it's spec which means it'd be safe that no one will actually use pin 9 for anything other than ground or nothing. VGA probably needs to be obsoleted so that other technologies can prevail as there are far better ways now and yet we still continue with an outdated technology.Cheer,MC
  17. I usually only set up a server for testing and development. Never actually considered hosting my own site as I think if I read the ToC, My ISP probably does not allow it, nor has my ISP guaranteed that my IP is static, even though it hasn't changed yet.I like developing plugins, etc for wordpress as well as other open source web programs. A lot of the lesser known ones too, because if you start doing things that aren't even found in the popular software they usually copy you, it also means less support too which I enjoy and would rather let someone port it to the popular software so they can deal with support issues.I remember a few years ago, we use to mess around with IPB a lot, although it was all inhouse and really only made for our personal use. It never went well, as every update meant having to redo it again and I think some of the stuff we did is still left-over and really needs to be cleaned up. IPB wasn't free so it sort of lost a lot of our attention and other boards provide better testing grounds.Cheers,MC
  18. GNU/Linux Webserver - How To Install an Apache Web Server with PHP and MySQL This guide will help you install a web server on Red Hat alike RPM-based GNU/Linux distributions, specifically CentOS 6.3 and Fedora 18 but may work with other GNU/Linux based distributions by changing the package manager used for installing the software and discovering where the configuration files are stored on your distribution. If you are looking for installation on Debian like operating systems, then check out the tutorial that http://forums.xisto.com/user/87487-sils/ '>loramchugh has written on GNU/Linux Web Server With Apache2, PHP and MariaDB. Securing this server for production use is for another tutorial so that I could separate the installation from the configuration. Note: This tutorial is all done inside terminal with a super user, suitable for those who have done a minimal installation which is the recommended way for creating a dedicated web server. How To Install an Apache Web Server Apache (httpd) is the most popular HTTP web server software in use and one of the guiding reasons for installing this web server over other alternatives such as lighttpd or nginx. It has a lot of information that helps with setting it up. If this is your first time installing a web server then it is highly recommended you use Apache. If you want better performance, the two alternatives I suggested are worth looking at. To begin first we need to install httpd: sudo yum -y httpd Next we need to enable this server: For Fedora 18 sudo systemctl start httpd.servicesudo systemctl enable httpd.service For CentOS 6.3 sudo /etc/rc.d/init.d/httpd startsudo chkconfig httpd on And now to test if it is working: I was searching Fedora 18 and CentOS for a common program they shared amongst themselves so that I could perform the test. I first tried nc (netcat), which was found on Fedora but not CentOS. I tried telnet, it wasn't found on either, I tried wget which I found on Fedora but not CentOS. I then tried curl, and discovered that both CentOS and Fedora both shared this program in common. Usually the anaconda installer for CentOS and Fedora rely on curl for downloading, so this is the program we will use for testing whether our web server is running. curl -IL http://localhost/ If you get output similar to: HTTP/1.1 403 ForbiddenDate: Wed, 27 Feb 2013 17:56:46 GMTServer: Apache/2.2.15 (CentOS)Accept-Ranges: bytesContent-Length: 5039Connection: closeContent-Type: text/html; charset=UTF-8 This shows only the header information of the website, which means that the web server responded to our request with this reply. If you would like to see the HTML of the site you can remove the I from the switch so that you get all data returned. Then you have successfully installed the Apache HTTP Server. If you are not so successful and you get: curl: (7) couldn't connect to host You should restart your service to see if that solves the problem first. For Fedora 18 sudo systemctl restart httpd.service For CentOS 6.3 sudo /etc/rc.d/init.d/httpd restart And then try the test again. If you are still not successful, take note of the error and leave a message here and I will provide more help in solving your issues. How To Install PHP PHP is a server side scripting language that can be embedded into HTML that allows a flexible way of producing a dynamic nature to static HTML web pages. PHP code is only executed within the delimiters. It started off as a competitor to ASP (Active Server Pages) but is now more widely accepted. There are other dynamic languages that you could use like PERL, Ruby, Python and many more languages. To install php we do: sudo yum -y install php We now restart our web server for changes to take place, every alteration involving httpd should require a restart: For Fedora 18 sudo systemctl restart httpd.service For CentOS 6.3 sudo /etc/rc.d/init.d/httpd restart Now we need to create a PHP file to test: sudo vi /var/www/html/index.php Inside the vi editor, lets get into insert mode by press I and typing: <?php print('PHP is installed.'); ?> Press Escape to get out of insert mode and back into command mode then type :wq to save and quit. Now to test it out: curl -L http://localhost/ If you get the output: PHP is installed You have PHP enabled on your web server. If you want to remove the file you created you can do: sudo rm /var/www/html/index.php The location for storing websites is /var/www/html, however it is owned by root and it not really a suitable location if you want your normal user to be creating pages. In our web server configuration set up, we will look at areas that gives us an easier way to serve our own pages from a location in our home directory, so be on the lookout for that guide. How To Install MySQL MySQL is the most popular open source relational database management system being used. Although it is used mostly for web it can be used for anything that requires storing collections of structured data. It provides multi-user access to allow simultaneous queries and scales well for small to medium sized applications. Another alternative to MySQL is MariaDB that is an enhanced drop in replacement for MySQL created by some of the original authors of MySQL. You could also check out PostgreSQL which claims to be the most advanced open source object relational database. To install mysql: sudo yum -y install mysql-server Once it is installed we need to start and enable it: For Fedora 18 sudo systemctl start mysqld.servicesudo systemctl enable mysqld.service For CentOS 6.3 sudo /etc/rc.d/init.d/mysqld startsudo chkconfig mysqld on Next we need to set up a password for our root user on this database as well as remove anonymous log ins, so lets log into mysql with the root user. mysql -u root Now we have connected to our mysql database (mysql-server) using the mysql client. Now we need to query all the users for this database: SELECT user, host, password FROM mysql.user; Also the SQL commands (those in uppercase above) are case insensitive which means you could do it all lowercase, mixed case, however you like. I prefer UPPERCASE as this is how you see it widely used and it helps to see the difference between names and commands, although when typing it in the mysql prompt, it's not really that important, but I just try to get use to doing this as a habit. Your output might look like this: +-------+-----------------------+----------+| user | host | password |+-------+-----------------------+----------+| root | localhost | || root | localhost.localdomain | || root | 127.0.0.1 | || root | ::1 | || | localhost | || | localhost.localdomain | |+-------+-----------------------+----------+6 rows in set (0.00 sec) Every row that has a user root, we need to either put a password on it or remove it. Every row without a user needs to be removed. As you can see with this table, there is no password set for all users on this database, no user is actually the anonymous user, so it allows anonymous login. Although they will not have the privileges like that of the root user. The host with ::1 is the IPv6 address, I don't use IPv6 in my network, so I remove this. So lets remove the ones we don't need first, your commands may differ slightly compared to your table: DELETE FROM mysql.user WHERE user='root' AND host='::1';DELETE FROM mysql.user WHERE user=''; Now we have cleared the ones we don't need, lets set a password on all our root users, make sure to chage YourPasswordHere to the password you want to use for root on mysql: SET PASSWORD FOR root@localhost=PASSWORD('YourPasswordHere');SET PASSWORD FOR root@'127.0.0.1'=PASSWORD('YourPasswordHere');SET PASSWORD FOR root@'localhost.localdomain'=PASSWORD('YourPasswordHere'); Now run the query to show your database to see if we have done what we asked it to do. SELECT user, host, password FROM mysql.user; If the table is showing the ones you want to keep and all the rows with user root with a password (which is hashed for security reasons) and no anonymous users all we need to do is now test that we can log in with root with the password. So type exit to leave mysql then do: mysql -u root -p When asked to enter the password for root, type in the password you set. If you log in we have finished with setting it up. There's an easier way to do the above, which also removes the test database but I wanted to also show you how to execute mysql commands. So now we can run this in terminal: mysql_secure_installation This will take you through the steps of entering your root password, etc. There's no need to change your root password if you have already set it up above but you'll want to disallow root logins from remote connections, disallow anonymous connections and also remove the test database. In this guide we have sucessfully installed Apache (httpd), PHP and MySQL (mysql-server). This is only just the first step. We have shown that it works but we are not really utilising it at this stage. We still need to configure it so that it will be easier for us to work with which is what my next guide will be on and then another guide to actually putting it to use so we can start hosting our own web server whether for testing, production or development. The goal will be to get it production ready, although if you are thinking of hosting others, this is not the way to go about it and I may or Velma, will talk about Virtual Private Servers, which is how I would set up web hosting from a dedicated server. Cheers, MC
  19. If you look at the pins (male connector) face on with the widest end at the top the first left 3 pins are the RGB, the 4th pin shouldn't matter, it's just an ID pin. The 5th pin is Ground. The 6th pin starts below the first pin and 6-8 are ground, usually grounding for the RGB. The 9th pin shouldn't matter and can infact not be present which might be the pin you're referring to? The 10th pin is another ground. Then below the 6th pin you have pins 11 to 15. 11 and 12 are ID pins, 13 and 14 are Horizontal Sync and Vertical Sync and 15 is another ID pin.It probably would have been easier to just say what pins you need, cause in reality, you only need 8 pins from vga to make it work.So pins to make it work are 1, 2, 3, 5, 12, 13, 14 and 15. You probably could get away with not having 12 either, but they can use it for other data. pin 5 for grounding actually combines 5, 6, 7, 8 and 10. Most ID pins are just manufacturer data to maybe tell what the device is.If you're looking at a female version, it's reversed with pin 1 starting on the right side.Cheers,MC
  20. iGuest

    7zip Or Rar?

    I usually would avoid using rar because of it being proprietary, which means that a developer maybe required to buy rights to actually have RAR in their compression tool which means having a tool that can work with most compressions maybe not available due to this and it won't be standard on some Linux distributions. That would mean out of those two options I would pick 7zip.However, if you were wanting better compression and also another open source alternative, I would opt for xz, which is a stripped down version of 7zip and in most cases has superior compression over 7zip. xz is probably less known than 7zip and even more so than rar but if more people know about it, and start using it. It could get recognised just as 7zip got it's recognition, which is why I'm spreading it now. You can usually combine tar with xz, tar.xz although still not very common to see a lot of these compressions around yet but it should be heading as a defacto for Linux.Cheers,MC
  21. I sort of have to disagree on security-breaker being not generally clever, it really is a skill to be able to execute and perform exploitations of a system and that not everyone can do this without learning a great deal. I think this is a misconception between cracker and script kiddies, where script kiddies are like sheep who can only follow on what others have already done and use tools that were created as proof of concept which in turn gets created over and over again by other programmers (stealing others credit) and released into the wild.Even for a safe cracker, there is skill needed to do such a thing. Breaking a combination would be more skillful than using explosives to break in. Although not technically skillful in using explosives it still may have required some calculation in ensuring that it would actually work. I think I would have more chance getting into a safe using explosives than cracking the combination. So it seems that the knowledge that proves it works can be considered the skill. However, even those who can theorise potential probability can also be considered in the same group, even if no proof exists. It just fascinates their ideas and people either truly understand it or play along like they do.I think the issue here is the need to categorise people and although I feel this is being a stereotype it's not suitable to just put people into single categories. I have faced problems with being stereotyped and it's because people know me from one thing or the other. I'm good with computers, good at programming but I'm also good at boxing and playing the guitar. The people who have seen me box and play guitar, may not even know that I'm good with computers and those who have seen me on a computer may not know that I can box or play guitar and this is where I get categorised as a person who can only do one of those things when my knowledge actually reaches further than computing. Maybe I just need to walk into the ring holding a laptop and a guitar so that everyone can see what I am like outside of the ring.Cheers,MC
  22. some nice methods above, two more methods: 1. place a transparent png/gif (ex. size: 5px x 5px) over the top of your image, the user then saves the duff image instead of the one you're trying to protect. hopefully they will have left your page before they realise they got a duff! 2a. another method is using css to do the same, then instad of getting an image to save, when they right click to save they get the html instead. try this out. have a look-see http://forums.xisto.com/no_longer_exists/ you'll see that even when viewing the source the picture url is not showing. NB: the css should go in a separate file, this means they have to download and view the css first to get the url, not fool proof but it does add inconvenience 2b. also, chop the image up ~ the 2nd example displays the image in four pieces again not fool proof but it does add inconvenience = here's the code, just change the urls and file names to suit your needs the html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "[url="http://forums.xisto.com/no_longer_exists/ xmlns="[url="http://forums.xisto.com/no_longer_exists/ http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>securePics</title><link rel="stylesheet" type="text/css" href="securePics.css" /></head><body><!-- BOF 1ST EXAMPLE NOT USING CSS --><table style="display: inline;" border="0" cellspacing="0" cellpadding="0"><tbody><tr height="360"><td style="background-image: url(XXX_TROG-HAT_4994_aems_T.png);" width="360"> <img title="TROG-HAT" src="5345_534_590.png" alt="" width="360" height="360" /> </td></tr></tbody></table><!-- EOF 1ST EXAMPLE NOT USING CSS --><!-- BOF 2ND EXAMPLE USING CSS AND CHOPPED METHOD--><table style="display: inline;" border="0" cellspacing="0" cellpadding="0"><tbody><tr height="150"><td class="hidenpic1" width="150"><div class="hidepic1"></div></td><td class="hidenpic2" width="150"><div class="hidepic2"></div></td></tr><tr height="150"><td class="hidenpic3" width="150"><div class="hidepic3"></div></td><td class="hidenpic4" width="150"><div class="hidepic4"></div></td></tr></tbody></table><!-- EOF 2ND EXAMPLE USING CSS AND CHOPPED METHOD--></body></html>the css @charset "utf-8";/* CSS Document */body{background-color: transparent;background-image: url('bgr.gif');background-repeat: repeat-x;background-attachment: fixed;}.hidepic1,.hidepic2,.hidepic3,.hidepic4{border:none;background-image: url(5345_534_590.png);background-repeat:repeat;width:180px;height:180px;}.hidenpic1{background-image: url(XXX_TROG-HAT_4994_aems_T1.png);}.hidenpic2{background-image: url(XXX_TROG-HAT_4994_aems_T2.png);}.hidenpic3{background-image: url(XXX_TROG-HAT_4994_aems_T3.png);}.hidenpic4{background-image: url(XXX_TROG-HAT_4994_aems_T4.png);}.hidenpic1,.hidenpic2,.hidenpic3,.hidenpic4{border:none;}
  23. I'm trying CentOS on VirtualBox, and just tested if I could load the graphical installer. I picked text mode by default when I first installed it, so didn't realise that the graphical installer would not run but did notice the lack of options text mode had, like no partitioning/configuration for the hard drive. It could be that it requires more video memory than Red Hat for a graphical install which I will try boosting up next time though it may not even be on my install, as I only got the net install CD since I like minimal installs.The next question I would ask is, if Howard Stern is hosting his own website or if we can find out who his host is.I remove Server tokens/signatures from the configuration file or fake it as an IIS machine just to be target practise. I wonder how many web hosts actually use Ubuntu, I know it's up and coming, but why Ubuntu over Debian? Possibly because Debian takes too long to get newer versions of programs.Cheers,MC
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.